Espionage and secret services Books

919 products


  • The Plot to Destroy Trump: The Deep State

    Skyhorse Publishing The Plot to Destroy Trump: The Deep State

    10 in stock

    Book Synopsis“The DEEP STATE conspired to take down TRUMP. This book fills in all the details, and names names. All Patriots need to read it.”—Alex Jones, founder, InfowarsThe Plot to Destroy Trump exposes the deep state conspiracy to discredit and even depose the legitimately elected President Donald J. Trump with the fabricated Russian dossier, including: How the unsubstantiated accusations of collusion began with former MI6 agent Christopher Steele, Fusion GPS, and the Democratic National Convention on behalf of Hillary Clinton The opportunistic role played by Russia’s FSB and former KGB agents, according to Putin’s strategy to create chaos in the West Wikileaks, along with Fake News Award–winner CNN, BuzzFeed, and the other liberal media that all played a part in pushing the information to the American people The compromised CIA and FBI personnel who took the dossier and ran with it, despite knowing it was unverified The roles that George Papadopoulos, Carter Page, Bruce and Nellie Ohr, Paul Singer, Paul Manafort, and the Podesta brothers played—or did not play—in the conspiracy against the president How does all this tie together? And what does it mean for Trump’s presidency and American democracy? Ted Malloch names the players, connects the dots, and explains who was behind the plot to create a red November. With a foreword by New York Times bestseller and Trump confidant Roger Stone, The Plot to Destroy Trump uncovers the biggest political scandal since Watergate.

    10 in stock

    £15.19

  • The Greatest Spy

    Skyhorse Publishing The Greatest Spy

    3 in stock

    Book SynopsisDiscover the life and daring exploits of the real-life model for the world's most famous spy, James Bond: Sidney Reilly! When a twenty-year-old Ukrainian arrived in London as a candidate for the position of secret agent in Britain’s Secret Intelligence Bureau, the chiefs of what would one day become MI5 were wise to hire him, as he would become Britain’s greatest spy, a man known by several names. His ingenuity and his mastery of the trade, and his audacity and coolness when in danger, were highly praised. To penetrate the Irish Republican Army (IRA), he was given the code name of Sidney Reilly. He was tasked with kidnapping Lenin and Trotsky during the Russian Revolution, and visited the major battlefronts across Soviet Russia during the civil war, sending back proposals to defeat the Reds. He stole Germany's naval plans from Krupp and the harbor plans in Mongolia for Britain’s allies, and he posed as a German officer to engage in discussions with the Kaiser and his chiefs of staff about their U-boat tactics against the Allies. He also helped to obtain oil from Persia to modernize Britain’s Naval Fleet when Churchill was First Lord of the Admiralty. In 1953, novelist Ian Fleming used Reilly’s secret Admiralty Intelligence file to write his novels about a fictional secret agent he called James Bond 007. But Reilly’s true exploits were even more thrilling and fantastic than those of the fictional James Bond. Reilly was Britain’s best spy—but was he also a Soviet double-agent? Author John Harte retells Reilly’s story as it really was, in fast-moving prose with an eye for telling detail—and provides a twist: He tells us what really happened to Reilly after he vanished in Soviet Russia in 1925 and was assumed to have been murdered by Stalin’s secret police. Find out what really happened to the man who inspired the creation of the world's most famous spy in The Greatest Spy. But Bond’s adventures were fantasies, whereas Reilly’s were real.

    3 in stock

    £12.59

  • Food Justice Now!: Deepening the Roots of Social

    University of Minnesota Press Food Justice Now!: Deepening the Roots of Social

    15 in stock

    Book SynopsisA rallying cry to link the food justice movement to broader social justice debates The United States is a nation of foodies and food activists, many of them progressives, and yet their overwhelming concern for what they consume often hinders their engagement with social justice more broadly. Food Justice Now! charts a path from food activism to social justice activism that integrates the two. It calls on the food-focused to broaden and deepen their commitment to the struggle against structural inequalities both within and beyond the food system. In an engrossing, historically grounded, and ethnographically rich narrative, Joshua Sbicca argues that food justice is more than just a myopic focus on food, allowing scholars and activists alike to investigate the causes behind inequities and evaluate and implement political strategies to overcome them. Focusing on carceral, labor, and immigration crises, Sbicca tells the stories of three California-based food movement organizations, showing that when activists use food to confront neoliberal capitalism and institutional racism, they can creatively expand how to practice and achieve food justice.Sbicca sets his central argument in opposition to apolitical and individual solutions, discussing national food movement campaigns and the need for economically and racially just food policies—a matter of vital public concern with deep implications for building collective power across a diversity of interests.Trade Review"By highlighting sites where justice, rather than food, is the primary motivator of social action, Joshua Sbicca’s timely and important book takes the conversation about food justice exactly where it needs to go."—Julie Guthman, co-editor of The New Food Activism: Opposition, Cooperation, and Collective Action"Can a food justice dialectics with a ‘radical imagination’ and strategies for change ameliorate economic and ethnoracial inequities? Joshua Sbicca’s searching analysis broadens food politics to new terrains of social movement building and struggle essential given today’s revanchist politics."—Julian Agyeman, Tufts University"Sbicca sees food justice as a universal cause that can unite and inspire broader social change, and his book provides a blueprint for activists who agree."—Civil Eats"This is an academic book but well worth reading for anyone who cares about building a movement with power to change food systems."—Food Politics"Sbicca challenges scholars and activists to locate the true causes of inequities and develop political strategies or social actions to overcome these causes."—Food Tank"Joshua Sbicca’s Food Justice Now! Deepening the Roots of Social Struggle calls for a radical new food politics led by social justice, which focuses its attention broadly on the roots of structural inequalities in the food system and beyond."—Antipode"Sbicca’s book stands out for its challenge to us to change both the way we think about food politics and about what counts as justice. We each came away from this book with a profound feeling that this work is fresh, necessary, and a long time coming."—Agriculture and Human Values"Food Justice Now! should be on every planner’s list to read this year. The book serves as a primer on food justice and its far-reaching effects to all parts of our society in the United States."—Carolina Planning Journal"Sbicca pushes the boundaries of the food justice movement forward in arguing for reformative modes of social relationships and organization to address institutional racism and neoliberal capitalism."—Food, Culture & SocietyTable of ContentsIntroduction: Food as Social Justice Politics1. Inequality and Resistance: The Legacy of Food and Justice Movements2. Opposing the Carceral State: Food-Based Prisoner Reentry Activism3. Taking Back the Economy: Fair Labor Relations and Food Worker Advocacy4. Immigration Food Fights: Challenging Borders and Bridging Social Boundaries5. Radicalizing Food Politics: Collective Power, Diversity, and SolidarityConclusion: Notes on the Future of Food JusticeAcknowledgmentsAppendix: Approach and DataNotesBibliographyIndex

    15 in stock

    £20.69

  • East German Intelligence and Ireland, 1949–90:

    Manchester University Press East German Intelligence and Ireland, 1949–90:

    Out of stock

    Book SynopsisThis book is an in-depth examination of the relations between Ireland and the former East Germany between the end of the Second World War and the fall of the Berlin Wall. It explores political, diplomatic, economic, media and cultural issues. The long and tortuous process of establishing diplomatic relations is unique in the annals of diplomatic history. Central in this study are the activities of the Stasi. They show how and where East German intelligence obtained information on Ireland and Northern Ireland and also what kind of information was gathered. A particularly interesting aspect of the book is the monitoring of the activities of the Irish Republican Army and the Irish National Liberation Army and their campaigns against the British army in West Germany. The Stasi had infiltrated West German security services and knew about Irish suspects and their contacts with West German terrorist groups. East German Intelligence and Ireland, 1949–90 makes an original contribution to diplomatic, intelligence, terrorist and Cold War studies.Trade Review‘An Irish specialist will find much of value in East German Intelligence and Ireland, 1949-90 and many interesting stepping-off points for further research.’Augustine Meaher, Air University, H-War, January 2018 -- .Table of ContentsIntroductionPART I: Relations between Ireland and East Germany1. History of the relations between Ireland/Northern Ireland and the GDRPART II: Intelligence2. Stasi history and sources 3. Keeping informed and spying on Ireland4. Northern Ireland in the Zentralen Personendatenbank (ZPDB)5. Watching the PIRA, the INLA and BAOR, 1970s–1980sConclusionBibliography Index

    Out of stock

    £44.07

  • Intelligence and Espionage in the English

    Manchester University Press Intelligence and Espionage in the English

    1 in stock

    Book SynopsisThis ambitious and important book is a richly detailed account of the ideas and activities in the early-modern ‘secret state’ and its agencies, spies, informers and intelligencers, under the English Republic and the Cromwellian protectorate. The book investigates the meanings this early-modern Republican state acquired to express itself, by exploring its espionage actions, the moral conundrums, and the philosophical background of secret government in the era. It considers in detail the culture and language of plots, conspiracies, and intrigues and it also exposes how the intelligence activities of the Three Kingdoms began to be situated within early-modern government from the Civil Wars to the rule of Oliver Cromwell. It introduces the reader to some of the personalities who were caught up in this world of espionage, from intelligencers like Thomas Scot and John Thurloe to the men and women who became its secret agents and spies. The book includes stories of activities not just in England, but also in Ireland and Scotland, and it especially investigates intelligence and espionage during the critical periods of the British Civil Wars and the important developments which took place under the English Republic and Oliver Cromwell in the 1650s. The book will appeal to historians, students, teachers, and readers who are fascinated by the secret affairs of intelligence and espionage.Table of ContentsIntroductionPart I: The background1 Themes and issues2 The secretary of state 3 The civil warsPart II: Republican espionage4 Thomas Scot and the English Republic5 John Thurloe and the Cromwellian regimeAfterwordIndex

    1 in stock

    £76.50

  • Paranoid Visions: Spies, Conspiracies and the

    Manchester University Press Paranoid Visions: Spies, Conspiracies and the

    1 in stock

    Book SynopsisParanoid visions explores the history of the spy and conspiracy genres on British television, from 1960s Cold War series through 1980s conspiracy dramas to contemporary ‘war on terror’ thrillers. It analyses classic dramas including Tinker Tailor Soldier Spy, Edge of Darkness, A Very British Coup and Spooks. This book will be an invaluable resource for television scholars interested in a new perspective on the history of television drama and intelligence scholars seeking an analysis of the popular representation of espionage with a strong political focus, as well as fans of cult British television and general readers interested in British cultural history.Trade Review‘Jo Oldham’s very readable book explores two of the most popular, but relatively neglected, forms of television drama: the spy drama and the conspiracy thriller. Generically related but epistemologically distinct, the changing nature of the two forms and the waxing and waning of their appearance on British television screens has much to do with the historical context of their production, as Oldham illustrates very well in a diachronic study […] Such changes may not bode well for the radical potential of spy and conspiracy drama to stir things up in the future but it is to Oldham’s credit that his well-researched and persuasively argued book makes us want to revisit some of the key "paranoid narratives" of the last 50 years’.Lez Cooke, Royal Holloway, University of London, Critical Studies in Television, Vol. 13, No. 4 (December 2018)'Paranoid visions is a welcome addition to studies of television genres and to emerging work on the spy genre on British screens. It is well-written, thoughtful and engaging, and should be read by students of quality British television drama as well as those drawn to narratives of intrigue, conspiracy and national security.'Alan Burton, Journal of British Cinema and Television, Vol. 16, No. 1 (2019) -- .Table of ContentsIntroduction1 ‘A balance of terror’: Callan (ITV, 1967–72) as an existential thriller for television2 ‘A professional’s contest’: procedure and bureaucracy in Special Branch (ITV, 1969–74) and The Sandbaggers (ITV, 1978–80)3 ‘Who killed Great Britain?’: Tinker Tailor Soldier Spy (BBC 2, 1979) as a modern classic serial4 Conspiracy as a crisis of procedure in Bird of Prey (BBC 1, 1982) and Edge of Darkness (BBC 2, 1985)5 Death of a master narrative: the battle for consensus in A Very British Coup (Channel 4, 1988)6 The precinct is political: espionage as a public service in Spooks (BBC 1, 2002–11)ConclusionIndex

    1 in stock

    £21.00

  • Spies and Stars: MI5, Showbusiness and Me

    Bloomsbury Publishing PLC Spies and Stars: MI5, Showbusiness and Me

    2 in stock

    Book Synopsis'Wickedly funny' Country Life 'Hilarious and candid' Observer _____________________________ London in the 1950s. Lottie is a reluctant typist at MI5 and the even more reluctant daughter of the organisation's most illustrious spy. Now she has had the bad luck to fall in love with Harry, a handsome if frustrated young actor, who has also been press-ganged into the family business, acting as one of her father's undercover agents in the Communist hotbed of British theatre. Together the two young lovers embark on a star-studded adventure through the glittering world of theatre - but, between missing files, disapproving parents, and their own burgeoning creative endeavours, life is about to become very complicated indeed...Trade ReviewThe great joy of Bingham’s prose is its youthful insouciance. She writes like a teenager, but an exceptionally observant one -- Lynn Barber * Spectator *Enormous fun ... Dazzling * Sunday Express *Wickedly funny * Country Life *Flamboyance is the keynote… I loved it * Daily Mail, Book of the Week *She has a keen eye … Bingham concentrates on amusing asides and scraps of dialogue, and the jokes carry the story blithely along … Its self-deprecatory portrait of a girl adrift is engaging, and it captures well the chance encounters that are often part of growing up -- Lindsay Duguid * Times Literary Supplement *Praise for MI5 and Me: 'Astonishing ... She still has all the exuberant delight of a teenager in telling stories to make herself and other people laugh. Long may she write -- Lynn Barber * Sunday Times *The sort of light, frothy book that makes your laugh out loud on public transport * Daily Mail, Books of the Summer 2018 *Hilarious and candid … Filled with period detail, Bingham’s memoir is entertaining and extraordinary -- Hannah Beckerman * Observer *A fun and breezy read * Observer, Best summer books 2018 *A Jilly Cooper heroine in a John le Carré world -- Libby Purves * Times Literary Supplement *A stone-cold comic classic … Joyfully silly * Tatler *Sparky and larky -- Lucy Hughes-Hallett * Guardian *Much fun it is … Brilliant, sly, charming and flighty * Spectator *One funny story follows another … You will be sure to find this book a most entertaining and enjoyable read * Country Life *

    2 in stock

    £9.49

  • Double Agent Celery: MI5's Crooked Hero

    Pen & Sword Books Ltd Double Agent Celery: MI5's Crooked Hero

    5 in stock

    Book SynopsisWith Britain braced for a German invasion, MI5 recruited an ex RNAS officer, come confidence trickster, called Walter Dicketts as a double agent. Codenamed Celery, Dicketts was sent to Lisbon with the seemingly impossible mission of persuading the Germans he was a traitor and then extract crucial secrets. Once there, the Nazis spirited him off to Germany. With his life on the line, Dicketts had to outwit his interrogators in Hamburg and Berlin before returning to Britain as, in the Nazis eyes, a German spy. Despite discovering he had been betrayed as an MI5 plant before he even left for Germany, Celery somehow got back to Lisbon. After that he persuaded an Abwehr Officer to defect, and spent nine months undercover in Brazil. A mixture of hero and crook, Dicketts was worldly and intelligent, charming and charismatic. Sometimes rich and sometimes poor, his private life was a web of complexity and deception. Using family and official records, police records, newspaper articles and memories, the author unravels the tangled yet true story of Double Agent Celery.Trade ReviewA fascinating journey into the past to uncover one of the most colourful rogues who spied for Britain. Michael Smith, bestselling author The Anatomy of a Traitor and The Secrets of Station X.; A classic recipe of wartime espionage with romance, perfidy and tragedy as added ingredients. Nigel West, bestselling author. Voted The Experts' Expert by a panel of other spy writers in The Observer in November 1989. ; The wartime double agent is one of the most indelible figures in all of literature. But there are few characters as bizarre and intriguing as the rascal who was codenamed Celery by MI5. In telling the story of her grandfather's adventures, Carolinda Witt has added a rollicking chapter to our understanding of World War II. And here's the incredible part: It's all true. Peter Duffy, bestselling author Double Agent and The Bielski Brothers.; As gripping and immersive as any spy novel. This tells the real story of agent Celery. Dr Helen Fry, author and historian The M Room: Secret Listeners who Bugged the Nazis and Spymaster The Secret Life of Kendrick; Powerful feel for the period and a sure touch generally on the techniques of spycraft. Without the Double Cross system Britain would probably have lost the Second World War. Professor Paul Moorcraft, former UK Ministry of Defence and prolific author on security issues.

    5 in stock

    £23.75

  • The Undercover Nazi Hunter: Unmasking Evil in

    Pen & Sword Books Ltd The Undercover Nazi Hunter: Unmasking Evil in

    15 in stock

    Book SynopsisWolfe Frank was Chief Interpreter at the Nuremberg Trials where he was dubbed 'The Voice of Doom'. A playboy turned resistance worker he had fled Germany for England in 1937 having been branded an 'enemy of the state - to be shot on sight'. Initially interned as an 'enemy alien', he was later released and allowed to join the British Army - where he rose to the rank of Captain. Unable to speak English when he arrived by the time of the trials he was considered to be the finest interpreter in the world. In the months following his service at Nuremberg, Frank became increasingly alarmed at the misinformation coming out of Germany so in 1949, backed by the New York Herald Tribune, he risked his life again by returning to the country of his birth to make an 'undercover' survey of the main facets of post-war German life and viewpoints. During his enterprise he worked as a German alongside Germans in factories, on the docks, in a refugee camp and elsewhere. Equipped with false papers he sought objective answers to many questions including: refugees; anti-Semiticism; morality, de-Nazification; religion; nationalism. The NYHT said at the time: 'A fresh appraisal of the German question could only be obtained by a German and Mr Frank had all the exceptional qualifications necessary. We believe the result of his "undercover" work told in human, factual terms, is an important contribution to one of the great key problems of the post-war world ... and incidentally it contains some unexpected revelations and dramatic surprises'. The greatest of those surprises was Frank single handedly tracking down and arresting the SS General ranked 'fourth' on the allies 'most wanted' list - and personally taking and transcribing the Nazi's confession. The Undercover Nazi Hunter not only reproduces Frank's series of articles (as he wrote them) and a translation of the confession, which, until now, has never been seen in the public domain, it also reveals the fascinating behind-the-scenes story of a great American newspaper agonizing over how best to deal with this unique opportunity and these important exposes.

    15 in stock

    £25.00

  • MI5: British Security Service Operations,

    Pen & Sword Books Ltd MI5: British Security Service Operations,

    Out of stock

    Book SynopsisMI5 is arguably the most secret and misunderstood of all the British government departments. Its enigmatic title - much more than its proper name, the Security Service - stands in the public mind for the dark world of the secret services in general. In reality it has a very specific brief: counter-intelligence. Its object is to combat espionage and subversion directed against the UK. Nigel West's book traces the history of MI5 clearly and accurately from its modest beginnings in 1909 until 1945, with the main part of the book focussing upon the important role which MI5 played in the Second World War. This includes the story of the sixteen enemy agents who were rounded up in Britain who were either hanged or shot; the manipulation of the Axis espionage networks by the use of turned' Abwehr agents (the famous Double Cross System), and the all-important check on its success provided by the intercepted German signals so brilliantly decoded at Bletchley; and the various deceptions practised on the German High Command. The book, which is laced with true anecdotes as bizarre and compulsively readable as any novel, is the fruit of years of painstaking research in the course of which Nigel West has traced and interviewed more than a hundred people who figure prominently in the story: German and Soviet agents, counter-intelligence officers and, most remarkably, more than a dozen of the double agents. In this new and revised edition, Nigel West details the organisational charts which show the structure of the wartime security apparatus, in what is regarded as the most accurate and informative account ever written of MI5 before and during the Second World War.

    Out of stock

    £21.25

  • GCHQ: The Secret Wireless War, 1900-1986

    Pen & Sword Books Ltd GCHQ: The Secret Wireless War, 1900-1986

    1 in stock

    Book SynopsisSignal intelligence is the most secret, and most misunderstood, weapon in the modern espionage arsenal. As a reliable source of information, it is unequalled, which is why Government Communications Headquarters, almost universally known as GCHQ, is several times larger than the two smaller, but more familiar, organisations, MI5 and MI6. Because of its extreme sensitivity, and the ease with which its methods can be compromised, GCHQ's activities remain cloaked in secrecy. In GCHQ: The Secret Wireless War, the renowned expert Nigel West traces GCHQ's origins back to the early days of wireless and gives a detailed account of its development since that time. From the moment that Marconi succeeded in transmitting a radio signal across the Channel, Britain has been engaged in a secret wireless war, first against the Kaiser, then Hitler and the Soviet Union. Following painstaking research, Nigel West is able to describe all GCHQ's disciplines, including direction-finding, interception and traffic analysis, and code-breaking. Also explained is the work of several lesser known units such as the wartime Special Wireless Groups and the top-secret Radio Security Service. Laced with some truly remarkable anecdotes, this edition of this important book will intrigue historians, intelligence professionals and general readers alike.

    1 in stock

    £21.25

  • The Nurse Who Became a Spy: Madge Addy's War

    Pen & Sword Books Ltd The Nurse Who Became a Spy: Madge Addy's War

    1 in stock

    Book SynopsisThe life story of Madge Addy, a working-class Manchester woman who volunteered to fight Fascism and Nazism in two major wars, is a truly remarkable one. Madge left her job and her husband to serve in the Spanish Civil War as a nurse with the Republican medical services. In Spain she was wounded in a bombing raid, fell in love with another foreign volunteer who became her second husband, was made a Prisoner of War and was the last British nurse to leave Spain, witnessing the horrors of Franco's Fascist regime before she left. She was caught up in the 'Fall of France' and lived in Marseille with her Norwegian husband. From 1940 to 1944 Madge was first an amateur resister and later a full-time secret agent, working with the likes of Ian Garrow, Pat O'Leary and Guido Zembsch-Schreve. She also acted as a courier, flying to Lisbon to deliver and receive secret messages from British intelligence. She also became romantically involved with a Danish secret agent and married him after the war. Madge's wartime achievements were recognised by the British with the award of an OBE and by the French with the award of the Croix de Guerre. Chris Hall brings Madge's story to life using archive material and photographs from Britain, France, Spain and Norway. Madge's Spanish Civil War experiences are vividly described in a mass of letters she wrote requesting medical aid and describing the harrowing conditions at her wartime hospital. Her activities in the Second World War show a woman with 'nerves of steel' and a bravery at times bordering on recklessness. As she herself said, 'I believe in taking the war into the enemy camp'.

    1 in stock

    £21.25

  • A Hundred Years of Spying

    Pen & Sword Books Ltd A Hundred Years of Spying

    15 in stock

    Book SynopsisEarly espionage organisations like Walsingham's Elizabethan spy network were private enterprises, tasked with keeping the Tudor Queen and her government safe. Formal use of spies and counter spies only really began in the years after 1909, when the official British secret service was founded. Britain became the first major proponent of secret information gathering and other nations quickly followed. The outbreak of war in 1914 saw a sudden and dramatic increase in the use of spies as the military quickly began to realise the value of covert intelligence. Spying 'came of age' during the war on the Western Front and that value only increased in the run up to the Second World War, when the threat of the Soviet Union and Nazi Germany began to make themselves felt. The Cold War years, with the use of moles, defectors and double agents on both sides of the Iron Curtain saw the art of spying assume record proportions. The passing on of atom secrets, the truth about Russian missiles on Cuba, it was the age of the double agent, the activities of whom managed to keep away the looming threat of nuclear war. _A Hundred Years of Spying_ takes the reader through the murky world of espionage as it develops over the course of the twentieth century, where the lines of truth and reality blur, and where many real-life spies have always been accompanied, maybe even proceeded, by a plethora of spy literature. This book will look at the use of and development of spying as an accepted military practice. It will focus on individuals from Belgians like Gabrielle Petite to the infamous Mata Hari, from people like Reilly Ace of Spies to the British traitors such as Philby, Burgess and McClean. The activities of American atom spies like the Rosenbergs will also be covered as will Russian double agent Oleg Penkovsky and many others.

    15 in stock

    £23.20

  • Secrets of the Cold War: Espionage and

    Pen & Sword Books Ltd Secrets of the Cold War: Espionage and

    1 in stock

    Book SynopsisThe Cold War, which lasted from the end of the Second World War to the collapse of the Soviet Union in 1991, was fought mostly in the shadows, with the superpowers manoeuvring for strategic advantage in an anticipated global armed confrontation that thankfully never happened. How did the intelligence organisations of the major world powers go about their work? What advantages were they looking for? Did they succeed? By examining some of the famous, infamous, or lesser-known intelligence operations from both sides of the Iron Curtain, this book explains how the superpowers went about gathering intelligence on each other, examines the type of information they were looking for, what they did with it, and how it enabled them to stay one step ahead of the opposition. Possession of these secrets threatened a Third World War, but also helped keep the peace for more than four decades. With access to previously unreleased material, the author explores how the intelligence organisations, both civilian and military, took advantage of rapid developments in technology, and how they adapted to the changing threat. The book describes the epic scale of some of these operations, the surprising connections between them, and how they contributed to a complex multi-layered intelligence jigsaw which drove decision making at the highest level. On top of all the tradecraft, gadgets and cloak and dagger', the book also looks at the human side of espionage: their ideologies and motivations, the winners and losers, and the immense courage and frequent betrayal of those whose lives were touched by the Secrets of the Cold War.

    1 in stock

    £21.25

  • SPY SWAP: The Humiliation of Putin's Intelligence

    Pen & Sword Books Ltd SPY SWAP: The Humiliation of Putin's Intelligence

    1 in stock

    Book SynopsisOn Monday, 4 March 2019, Sergei Skripal and his 33-year-old daughter Yulia collapsed in the centre of Salisbury in Wiltshire. Both were suffering the effects of A-234, a third-generation Russian-manufactured military grade Novichok nerve agent. As three suspects, all GRU officers, were quickly identified, it was also established that the door handle to the Skripals' suburban home had been contaminated with the toxin. Whilst the Skripals had lived in the cathedral city for the past seven years, what Sergei's neighbours did not know was that he had once been a colonel in the Russian Federation's military intelligence service. Back in July 1996, he had been posted under diplomatic cover to Madrid where he was subsequently cultivated by Pablo Miller, an MI6 officer operating as a businessman under the alias Antonio Alvares de Idalgo. Sergei's recruitment by Miller was one of many successes achieved by Western agencies following the collapse of the Soviet Bloc. These counter-intelligence triumphs had their origins in a joint FBI/CIA project codenamed COURTSHIP which was based on the rather risky tactic of making an approach to almost any identified KGB or GRU officer, in almost any environment - a technique known as a 'cold pitch'. It soon yielded results; within five years COURTSHIP had netted about twenty assets. Codenamed FORTHWITH, Sergei was betrayed in December 2001\. Arrested in 2004, he was convicted of high treason in Russia, but was subsequently included in a prisoner swap in July 2010 and brought to the UK. The journey to the attempt on his life had begun. The Vienna spy swap was the culmination of a CIA plan to free a specific individual, Gennadi Vasilenko, who had been the Agency's key mole inside the KGB since March 1979\. To acquire the necessary leverage, the FBI swooped on a large network in the United States, bringing to an end a surveillance operation, codenamed GHOST STORIES, that lasted ten years. Anxious to avoid further embarrassment over the arrests, Vladimir Putin personally authorised an exchange, unaware of Vasilenko's true status. It was only after the transaction had been completed, and two further Russian spies were exfiltrated from Moscow, that the Kremlin learned of Vasilenko's value, and the scale of the deception. For the very first time, a Russian government had been persuaded to release four traitors and send them to the West. The humiliation was complete. As _Spy Swap_ reveals, Putin's retribution would manifest itself in a quiet Wiltshire market town.

    1 in stock

    £17.99

  • The Birth of the Soviet Secret Police: Lenin and

    Pen & Sword Books Ltd The Birth of the Soviet Secret Police: Lenin and

    1 in stock

    Book SynopsisThis book is new in every aspect and not only because neither the official history nor an unofficial history of the KGB, and its many predecessors and successors, exists in any language. In this volume, the author deals with the origins of the KGB from the Tsarist Okhrana (the first Russians secret political police) to the OGPU, Joint State Political Directorate, one of the KGB predecessors between 1923 and 1934\. Based on documents from the Russian archives, the author clearly demonstrates that the Cheka and GPU/OPGU were initially created to defend the revolution and not for espionage. The Okhrana operated in both the Russian Empire and abroad against the revolutionaries and most of its operations, presented in this book, are little known. The same is the case with regards to the period after the Cheka was established in December 1917 until ten years later when Trotsky was expelled from the Communist Party and exiled, and Stalin rose to power. For the long period after the Revolution and up to the Second World War (and, indeed, beyond until the death of Stalin) the Cheka's main weapon was terror to create a general climate of fear in a population. In the book, the work of the Cheka and its successors against the enemies of the revolution is paralleled with British and American operations against the Soviets inside and outside of Russia. For the first time the creation of the Communist International (Comintern) is shown as an alternative Soviet espionage organization for wide-scale foreign propaganda and subversion operations based on the new revelations from the Soviet archives Here, the early Soviet intelligence operations in several countries are presented and analysed for the first time, as are raids on the Soviet missions abroad. The Bolshevik smuggling of the Russian imperial treasures is shown based on the latest available archival sources with misinterpretations and sometimes false interpretations in existing literature revised. After the Bolshevik revolution, Mansfield Smith-Cumming, the first chief of SIS, undertook to set up an entirely new Secret Service organization in Russia'. During those first ten years, events would develop as a non-stop struggle between British intelligence, within Russia and abroad, and the Cheka, later GPU/OGPU. Before several show spy trials' in 1927, British intelligence networks successfully operated in Russia later moving to the Baltic capitals, Finland and Sweden while young Soviet intelligence officers moved to London, Paris, Berlin and Constantinople. Many of those operations, from both sides, are presented in the book for the first time in this ground-breaking study of the dark world of the KGB.

    1 in stock

    £21.25

  • The Skripal Files: Putin, Poison and the New Spy

    Pan Macmillan The Skripal Files: Putin, Poison and the New Spy

    15 in stock

    Book SynopsisThe Skripal Files tells the full story behind the Salisbury Poisonings, one of the most shocking incidents to occur in Britain in recent memory. Broadcaster and historian Mark Urban interviewed Sergei Skripal in the months before the poisoning and explains why Skripal was targeted for assassination.'A scrupulous piece of reporting, necessary, timely and very sobering' – John Le CarréChosen as one of the best political books of 2018 by the Sunday Times.4 March 2018, Salisbury, England.Sergei Skripal and his daughter Yulia were enjoying a rare and peaceful Sunday spent together, completely unaware that they had been poisoned with the deadly nerve agent Novichok. Hours later both were found slumped on a park bench close to death.Following their attempted murders on British soil, Russia was publicly accused by the West of carrying out the attack, marking a new low for international relations between the two since the end of the Cold War.The Skripal Files is the definitive account of the Salisbury Poisonings and how Skripal’s story fits into the wider context of the new spy war between Russia and the West. The book explores Sergei's past as a spy in the Russian military intelligence, explains how he was turned to work as an agent by MI6, and his imprisonment in Siberia. His eventual release as part of a spy-swap brought him to Salisbury where, on that fateful day, he and his daughter found themselves fighting for their lives.Trade ReviewFascinating account of the poisoning case . . . Other books will follow on the Skripals, but they will struggle to match the texture of Urban’s research, its knowledgeable hinterland * The Times *A scrupulous piece of reporting, necessary, timely and very sobering -- John Le CarréEngrossing . . . Urban tells the story of Skripal’s undercover career well, much of it previously unknown and gleaned from around 10 hours of conversations with him at his Salisbury home -- Luke Harding, GuardianBased on his extensive interviews with Skripal, provide an original and often fascinating read on the games that spies played in the wake of the Cold War * Sunday Times *A detailed account of Skripal’s life leading up to these terrible events * Daily Telegraph *Table of ContentsIntroduction - Introduction: Introduction Section - Prologue: An Unlawful Use of Force Section - Part One: Agent Chapter - 1: The Pitch Chapter - 2: Sergei's Journey Chapter - 3: Into the Darkness Chapter - 4: Master Race No Longer Chapter - 5: Breakthrough in Madrid Chapter - 6: Inside the Glass House Chapter - 7: The View From Vauxhall Chapter - 8: Back Into the Light Section - Part Two: Prisoner Chapter - 9: Inside Lefortovo Chapter - 10: Litvinenko Chapter - 11: IK 5 Chapter - 12: Hitmen Chapter - 13: The Fateful Letter Chapter - 14: Operation Ghost Stories Chapter - 15: Deliverance Chapter - 16: Christie Miller Road Section - Part Three: Target Chapter - 17: Sunday 4 March Chapter - 18: The Fight For Survival Chapter - 19: 'Highly Likely' Russia Chapter - 20: The Investigation Falters Chapter - 21: The Information War Chapter - 22: The Long Road to Recovery

    15 in stock

    £9.99

  • Day of the Assassins: A History of Political

    Pan Macmillan Day of the Assassins: A History of Political

    2 in stock

    Book Synopsis‘Written with Burleigh’s characteristic brio, with pithy summaries of historical moments (he is brilliant on the Americans in Vietnam, for example) and full of surprising vignettes’ – The Times ’Book of the Week’In Day of the Assassins, acclaimed historian Michael Burleigh examines assassination as a special category of political violence and asks whether, like a contagious disease, it can be catching.Focusing chiefly on the last century and a half, Burleigh takes readers from Europe, Russia, Israel and the United States to the Congo, India, Iran, Laos, Rwanda, South Africa and Vietnam. And, as we travel, we revisit notable assassinations, among them Leon Trotsky, Hendrik Verwoerd, Juvénal Habyarimana, Indira Gandhi, Yitzhak Rabin and Jamal Khashoggi.Combining human drama, questions of political morality and the sheer randomness of events, Day of the Assassins is a riveting insight into the politics of violence.‘Brilliant and timely . . . Our world today is as dangerous and mixed-up as it has ever been. Luckily we have Michael Burleigh to help us make sense of it.’ – Mail on SundayTrade ReviewDay of the Assassins is written with Burleigh’s characteristic brio, with pithy summaries of historical moments (he is brilliant on the Americans in Vietnam, for example) and full of surprising vignettes, which he handles with a commendable sang-froid. -- David Aaronovitch 'Book of the Week' * The Times *A lively account of how political murders, from Julius Caesar onwards, have differed from most others. * Daily Telegraph Top History Books of the Year *Michael Burleigh’s Day of the Assassins reminds us that political murder is as old as mankind . . . The detail, as always in Burleigh’s books, is conveyed with great brio -- Jonathan Powell * New Statesman *One of the great pleasures of reading Burleigh, a man never afraid to speak his mind, is the matter-of-fact way in which he dissects and disposes of sacred cows . . . Burleigh’s analysis of Putin’s Russia, incidentally, is a brilliant and timely reminder of the danger of taking things at face value. Our world today is as dangerous and mixed-up as it has ever been. Luckily we have Michael Burleigh to help us make sense of it. -- Simon Griffith * Mail on Sunday *A thoughtful and eminently readable book. -- Nigel Jones * BBC History Magazine *Burleigh, a historian of Germany and a prolific newspaper commentator, is careful to recognise the whodunnits where mystery is as gripping as any historical methodology -- Peter Stothard * History Today *Relentlessly sanguinary . . . harshly excellent. -- Jonathan Meades * Literary Review *

    2 in stock

    £11.69

  • The Quiet Americans: Four CIA Spies at the Dawn

    Pan Macmillan The Quiet Americans: Four CIA Spies at the Dawn

    15 in stock

    Book Synopsis‘A darkly entertaining tale about American espionage, set in an era when Washington’s fear and skepticism about the agency resembles our climate today.’ New York Times At the end of World War II, the United States dominated the world militarily, economically, and in moral standing – seen as the victor over tyranny and a champion of freedom. But it was clear – to some – that the Soviet Union was already executing a plan to expand and foment revolution around the world. The American government’s strategy in response relied on the secret efforts of a newly-formed CIA. The Quiet Americans chronicles the exploits of four spies – Michael Burke, a charming former football star fallen on hard times, Frank Wisner, the scion of a wealthy Southern family, Peter Sichel, a sophisticated German Jew who escaped the Nazis, and Edward Lansdale, a brilliant ad executive. The four ran covert operations across the globe, trying to outwit the ruthless KGB in Berlin, parachuting commandos into Eastern Europe, plotting coups, and directing wars against Communist insurgents in Asia. But time and again their efforts went awry, thwarted by a combination of stupidity and ideological rigidity at the highest levels of the government – and more profoundly, the decision to abandon American ideals. By the mid-1950s, the Soviet Union had a stranglehold on Eastern Europe, the US had begun its disastrous intervention in Vietnam, and America, the beacon of democracy, was overthrowing democratically elected governments and earning the hatred of much of the world. All of this culminated in an act of betrayal and cowardice that would lock the Cold War into place for decades to come. Anderson brings to the telling of this story all the narrative brio, deep research, sceptical eye, and lively prose that made Lawrence in Arabia a major international bestseller. The intertwined lives of these men began in a common purpose of defending freedom, but the ravages of the Cold War led them to different fates. Two would quit the CIA in despair, stricken by the moral compromises they had to make; one became the archetype of the duplicitous and destructive American spy; and one would be so heartbroken he would take his own life. Scott Anderson’s The Quiet Americans is the story of these four men. It is also the story of how the United States, at the very pinnacle of its power, managed to permanently damage its moral standing in the world.Trade ReviewEnthralling . . . Lying and stealing and invading, it should be said, make for captivating reading, especially in the hands of a storyteller as skilled as Anderson . . . the climate of fear and intolerance that it describes in Washington also feels uncomfortably timely. * New York Times Book Review *Anderson’s look at four men who ran covert operations around the globe after World War II is as thrilling as it is tragic, as each man confronts the moral compromises he made in the name of democracy. * Washington Post *In this sweeping, vivid, beautifully observed book, Scott Anderson unearths the devastating secret history of how the United States lost the plot during the Cold War. By focusing on the twisty, colorful lives of four legendary spies, Anderson distills the larger geopolitical saga into an intimate story of flawed but talented men, of the 'disease of empires,' and of the inescapable moral hazard of American idealism and power. It's a hell of a book, with themes about the unintended consequences of espionage and interventionism that still resonate, powerfully, today. -- Patrick Radden Keefe, author of The New York Times bestseller and Orwell Prize-winning Say NothingA probing history of the CIA’s evolving role from the outset of the Cold War into the 1960s, viewed through the exploits of four American spies . . . Anderson delivers a complex, massively scaled narrative, balancing prodigious research with riveting storytelling skills . . . An engrossing history of the early days of the CIA. * Kirkus Reviews *A darkly entertaining tale about American espionage, set in an era when Washington’s fear and skepticism about the agency resembles our climate today. * New York Times *

    15 in stock

    £9.49

  • README.txt: A memoir from one of the world’s most

    Vintage Publishing README.txt: A memoir from one of the world’s most

    2 in stock

    Book SynopsisAn extraordinarily brave and moving memoir from one of the world's most famous whistle-blowers, activists and trans women.In 2013, Chelsea Manning was sentenced to thirty-five years in military prison for the largest leak of classified documents in history. The next day, Chelsea declared her gender identity as a woman and began to transition.In this radically candid memoir, Chelsea recounts how her challenging youth led her to join the US Army. She writes of the fierce pride she took in her work, the risks of the military's queer underground and the wider culture of silence and unaccountability. She describes fifty-nine days locked in an iron cage after her fateful decision and the community of solidarity she later discovered in prison. Above all, we see the phenomenal courage and resilience it took to survive and become a global advocate for transparency.'A terrific read, full of unexpected turns and details that counter many of the assumptions made about Manning' GUARDIAN 'Brilliantly told' THE TIMES'Searing...uplifting...redemptive' NEW YORK TIMES'A full and expansive account of Manning's life, one which is often harrowing but funny and poignant too' DAZEDTrade ReviewGripping ... It takes extraordinary qualities to do some of the things she recounts in this book ... Manning has become a new kind of American heroine * Observer *Electrifying ... an insider confessional turned inside out for the 21st century ... Manning reckons with this complex relationship of sex and gender to political radicalism ... absorbing ... sublime * Washington Post *One of the bravest persons alive -- Yanis VaroufakisA terrific read, full of unexpected turns and details that counter many of the assumptions made about Manning at the time ... Opens like a Jason Bourne novel * Guardian *Chelsea Manning is the biggest hero that ever lived -- Vivienne WestwoodA heroine to millions -- Alan MooreA searing personal element ... Although troubling to read, it manages to be uplifting as well * The New York Times *Harrowing ... affecting * New Statesman *A candidly told story from activist Chelsea Manning, which turns the tell-all confessional upside down. ... Chelsea moves through her life story with poignant, personal detail ... It's shocking to read what she's witnessed and triumphed over. * The Face *Forceful ... To those who see Manning as a hero, [her memoir] will only intensify that feeling, given all the hardships she has overcome. Those who see villainy may perhaps find their views tempered by sympathy * Sunday Times *

    2 in stock

    £10.44

  • Spooked: The Secret Rise of Private Spies

    Hodder & Stoughton Spooked: The Secret Rise of Private Spies

    7 in stock

    Book SynopsisA spy story like no other. Private spies are the invisible force that shapes our modern world: they influence our elections, effect government policies and shape the fortunes of companies. More deviously, they are also peering into our personal lives as never before, using off-the shelf technology to listen to our phone calls, monitor our emails and decide what we see on social media.Spooked takes us on a journey into a secret billion-dollar industry in which information is currency and loyalties are for sale. An industry so tentacular it reaches from Saddam Hussein to an 80s-era Trump, from the Steele dossier written by a British ex-spy to Russian oligarchs sitting pretty in Mayfair mansions, from the devious tactics of Harvey Weinstein to the growing role of corporate spies in politics and the threat to future elections.Spooked reads like the best kind of spy story: a gripping tale packed with twists and turns, uncovering a secret side of our modern world.Trade ReviewMeier sets out to investigate the investigations industry . . . a revealing read -- Brendan Daly * Business Post *A gobsmacking book detailing the rise of wannabe James Bonds . . . an enjoyable romp through the stranger-than-fiction world of private intelligence agencies... Meier is a Pulitzer-winning former New York Times reporter, and he stirs an incredible amount of well-researched material into this book . . . a mad whirl of double-cross, Machiavellian machinations and, of course, money. -- Darragh McManus * Irish Independent *

    7 in stock

    £18.00

  • Spooked: The Secret Rise of Private Spies

    Hodder & Stoughton Spooked: The Secret Rise of Private Spies

    1 in stock

    Book SynopsisA Pulitzer Prize-winning journalist's revelatory look inside the sinister world of private spies.A spy story like no other.Private spies are the invisible force that shapes our modern world: they influence our elections, effect government policies and shape the fortunes of companies. More deviously, they are also peering into our personal lives as never before.Spooked takes us on a journey into a secret billion-dollar industry in which information is currency and loyalties are for sale. An industry so tentacular it reaches from the Steele dossier written by a British ex-spy to Russian oligarchs in Mayfair mansions, from the devious tactics of Harvey Weinstein to the growing role of corporate spies in politics and the threat to future elections.Spooked reads like the best kind of spy story: a gripping tale packed with twists and turns, uncovering a secret side of our modern world.Trade ReviewMeier sets out to investigate the investigations industry . . . a revealing read -- Brendan Daly * Business Post *A gobsmacking book detailing the rise of wannabe James Bonds . . . an enjoyable romp through the stranger-than-fiction world of private intelligence agencies... Meier is a Pulitzer-winning former New York Times reporter, and he stirs an incredible amount of well-researched material into this book . . . a mad whirl of double-cross, Machiavellian machinations and, of course, money. -- Darragh McManus * Irish Independent *

    1 in stock

    £9.49

  • Ambush at Central Park: When the IRA Came to New

    Fordham University Press Ambush at Central Park: When the IRA Came to New

    5 in stock

    Book SynopsisA compelling, action-packed account of the only officially sanctioned I.R.A attack ever conducted on American soil. In 1922, three of the Irish Republican Army’s top gunmen arrived in New York City seeking vengeance. Their target: “Cruxy” O’Connor, a young Irishman who kept switching sides as revolution swept his country in the wake of World War I. Cruxy’s last betrayal dealt a stunning blow to Ireland’s struggle for independence: Six of his IRA comrades were killed when he told police the location of their safe house outside Cork. A year later, the IRA gunned him down in a hail of bullets before a crowd of horrified New Yorkers at the corner of 84th Street and Central Park West. Based primarily on first-hand accounts, most of them never before published, Ambush at Central Park is a cinematic exploration of the enigma of “Cruxy” O’Connor: Was he really a decorated war hero who became a spy for Britain? When he defected to the IRA, did his machine gun really jam in a crucial attack? When captured, did he give up his IRA comrades only under torture? Was he a British spy all along? Or was he pursuing a decades-old blood feud between his family and that of one of his comrades? A longtime editor at The New York Times, author Mark Bulik delved through Irish government archives, newspaper accounts, census data, and unpublished material from the families of the main actors. Together they add to the sensational story of a rebel ambush, a deadly police raid, a dinner laced with poison, a daring prison break, a boatload of tommy guns on the Hoboken waterfront, an unlikely pair of spies who fall in love, and an audacious assassination plot against the British cabinet. Gravely wounded and near death, Cruxy refused to cooperate with the detectives investigating the case. And so, the spy who stopped spying and the gunman who stopped shooting became the informer who wouldn’t inform, even at death’s door. Here is a forgotten chapter of Irish and New York history: the story of the only officially authorized IRA attack on American soil.Table of ContentsIntroduction: Bloody Anniversaries | 1 1 The Ambush | 5 2 Feuds and Fights | 13 3 War and Rebellion | 20 4 The Battle for Cork | 33 5 The Doomsday Plot | 42 6 The Coolavokig Ambush | 53 7 Bloodbath at Ballycannon | 65 8 A Basketful of Poison | 73 9 The Spying Game | 79 10 A Boatload of Tommy Guns | 90 11 Passages | 102 12 The Hunt | 109 13 The Heel of the Hunt | 117 14 The Crux of the Matter | 134 Acknowledgments | 147 Notes | 149 Index | 165 Photographs follow page 86

    5 in stock

    £19.79

  • Intelligence Community Programs: Management,

    Nova Science Publishers Inc Intelligence Community Programs: Management,

    2 in stock

    Book SynopsisThis book is a compilation of CRS reports on the intelligence community. Congresss and the American publics ability to oversee and understand how intelligence dollars are spent is limited by the secrecy that surrounds the intelligence budget process. Chapter 1 is designed to shed light on the IC budgetin terms of its programs, management, and enduring issuesusing unclassified materials available in the public domain. Chapter 2 focuses on cross-cutting management issues that affect the Intelligence Communitys (ICs) ability to counter pervasive and emerging threats to the United States and balance resources both appropriately and wisely. The next chapter reports on the use of contractors within the intelligence community. Chapter 4 provides the names and appointment provisions for selected Intelligence Community (IC) senior officials. Chapter 5 summarizes dates and directives for the establishment of each of the 17 IC component organisations. IC Directive 116, Intelligence Planning, Programming, Budgeting, and Evaluation System provides guidance for the IPPBE process. The IPPBE process applies to all 17 IC components as discussed in chapter 6. Chapter 7 differentiates clandestine from covert, using clandestine to signify the tactical concealment of the activity and covert operations as planned and executed to conceal the identity of or permit plausible denial by the sponsor. The next chapter builds on the notification requirements and the different authorities of the U. S. Code need for covert action and clandestine activities. Chapter 9 posits a potential framework for congressional oversight of intelligence-related programs and activities using the existing committee structure and notification standards for the most sensitive intelligence activities: covert action and clandestine intelligence collection. Total intelligence spending is usually understood as the combination of the National Intelligence Program (NIP), which supports strategic planning and policymaking, and the Military Intelligence Program (MIP), which supports military operational and tactical levels of planning and operations as reported in chapter 10. Chapter 11 examines intelligence funding over the past several decades, with an emphasis on the period from 2007-2016.

    2 in stock

    £163.19

  • Encyclopedia of Political Assassinations

    Rowman & Littlefield Encyclopedia of Political Assassinations

    Out of stock

    Book SynopsisWith the recent declassification of secret documents new light has been shed on old mysteries. For example, we now know that what might be termed the "JFK assassination conspiracy industry" was deliberately fueled and manipulated by the KGB so as to distract the CIA and undermine confidence in successive U.S. administrations. Also, new evidence continues to emerge of Vladimir Putin’s commitment to the extra-judicial elimination of "extremists" overseas, as legitimized by the Duma in July 2006. Controversially, the legislation included a definition of “extremists” as "those slandering the individual occupying the post of president of the Russian Federation”. The Encyclopedia of Political Assassinations contains a chronology, an introduction, and appendixes. The encyclopedia section has more than 700 cross-referenced entries on assassinations, intelligence agencies, politics and foreign relations.Trade ReviewFrom military historian Nigel West, a specialist in intelligence and security issues, comes this fascinating historical contribution. The pages offer political intrigue, conspiracies, and law enforcement applications. This book is relevant, especially in a time when international relations, terrorism, and security issues are particularly concerning. The Encyclopedia of Political Assassinations details well-planned scenarios, motives, consequences, and the backgrounds of assassins. The well-organized book includes abbreviations and a glossary, as well as a chronology, introduction, and appendixes to support readers. Altogether there are more than 700 cross-referenced entries on assassinations, intelligence agencies, politics, and foreign relations. This book offers captivating reading for students, researchers, academics, and general readers. History enthusiasts will benefit from the reader-friendly format. Public and university libraries will consider this contribution an essential resource. Law enforcement agencies, intelligence services, and the secret service will also consider this book an excellent resource. * American Reference Books Annual *Table of ContentsAcknowledgments Author’s Note Abbreviations and Glossary Chronology Introduction The Encyclopedia Appendix 1 Operation FOXLEY Appendix II CIA Report, Soviet Use of Assassination and Kidnapping Appendix III CIA PB/FORTUNE Contingency Plan for Guatemala Appendix IV CIA Report The Attack That Failed: Iraq’s Attempt to AssassinateFormer President Bush in Kuwait in April 1993. Bibliography Index

    Out of stock

    £81.00

  • Strategic Cyber Deterrence: The Active Cyber

    Rowman & Littlefield Strategic Cyber Deterrence: The Active Cyber

    Out of stock

    Book SynopsisAccording to the FBI, about 4000 ransomware attacks happen every day. In the United States alone, victims lost $209 million to ransomware in the first quarter of 2016. Even worse is the threat to critical infrastructure, as seen by the malware infections at electrical distribution companies in Ukraine that caused outages to 225,000 customers in late 2015. Further, recent reports on the Russian hacks into the Democratic National Committee and subsequent release of emails in a coercive campaign to apparently influence the U.S. Presidential Election have brought national attention to the inadequacy of cyber deterrence. The U.S. government seems incapable of creating an adequate strategy to alter the behavior of the wide variety of malicious actors seeking to inflict harm or damage through cyberspace. This book offers a systematic analysis of the various existing strategic cyber deterrence options and introduces the alternative strategy of active cyber defense. It examines the array of malicious actors operating in the domain, their methods of attack, and their motivations. It also provides answers on what is being done, and what could be done, by the government and industry to convince malicious actors that their attacks will not succeed and that risk of repercussions exists. Traditional deterrence strategies of retaliation, denial and entanglement appear to lack the necessary conditions of capability, credibly, and communications due to these malicious actors’ advantages in cyberspace. In response, the book offers the option of adopting a strategy of active cyber defense that combines internal systemic resilience to halt cyber attack progress with external disruption capacities to thwart malicious actors’ objectives. It shows how active cyber defense is technically capable and legally viable as an alternative strategy for the deterrence of cyber attacks.Trade ReviewGiven the current news cycle, few books seem as relevant today as Jasper’s detailed and precise examination of the US cyber environment. Traditional methods of deterring an adversary (direct military action or the threat of direct action) are not viable in the age of cyber attacks, which can be carried out by both nations and individuals. How, then, do we deter attacks? What tools are at our disposal? What are legitimate retaliation methods? Jasper (Naval Postgraduate School) examines these questions in depth. He makes the case for the issue's relevance and urgency in the realm of international defense with numerous examples, such as the North Korean theft, via cyber warfare, of US wing designs for the US F-15 fighter. Other states have made similar attacks, compromising American defense, financial, and social systems. Jasper stresses that a national defense strategy to prevent, counter, and respond to cyber attacks requires automated and integrated capabilities employed outside traditional organizational boundaries. Without effective, coordinated strategies, international cyber attacks will continue to threaten federal agencies, commercial industry, and the fabric of our society. Appropriate for advanced students and professionals in the realm of defense and cyber technology policy. Summing Up: Recommended. Upper-division undergraduates through faculty and professionals * CHOICE *In the development of American cybersecurity policy, deterrence has simultaneously grown more important and more controversial, leaving policymakers who confront mounting cyber threats tempted by deterrent strategies shrouded in doubts about their effectiveness. In Strategic Cyber Deterrence, Scott Jasper breaks down the theory and practice of deterrence within the realm of cyberspace and argues that the traditional approaches of deterrence by retaliation, denial, and entanglement fail as strategic options. Instead, Jasper advocates for achieving strategic deterrence by combining robust, resilient cyber defenses with capabilities to engage in aggressive but calibrated countermeasures. His engaging contribution carefully cuts through the prevailing “something must be done” approaches to deterrence in cybersecurity and offers a strategy tailored to the challenges and capabilities that define the cyber realm. -- David P. Fidler, Adjunct Senior Fellow for Cybersecurity, Council on Foreign RelationsTable of ContentsI. Thinking About Deterrence 1. Strategic Landscape 2. Cyber Attacks 3. Theoretical Foundations II. Traditional Deterrence Options 4. Deterrence by Retaliation 5. Deterrence by Denial 6. Deterrence by Entanglement III. A Strategic Alternative 7. Active Cyber Defense 8. Alternative Strategy Selection Appendix: National Strategy Agenda

    Out of stock

    £81.00

  • Strategic Cyber Deterrence: The Active Cyber

    Rowman & Littlefield Strategic Cyber Deterrence: The Active Cyber

    Out of stock

    Book SynopsisAccording to the FBI, about 4000 ransomware attacks happen every day. In the United States alone, victims lost $209 million to ransomware in the first quarter of 2016. Even worse is the threat to critical infrastructure, as seen by the malware infections at electrical distribution companies in Ukraine that caused outages to 225,000 customers in late 2015. Further, recent reports on the Russian hacks into the Democratic National Committee and subsequent release of emails in a coercive campaign to apparently influence the U.S. Presidential Election have brought national attention to the inadequacy of cyber deterrence. The U.S. government seems incapable of creating an adequate strategy to alter the behavior of the wide variety of malicious actors seeking to inflict harm or damage through cyberspace. This book offers a systematic analysis of the various existing strategic cyber deterrence options and introduces the alternative strategy of active cyber defense. It examines the array of malicious actors operating in the domain, their methods of attack, and their motivations. It also provides answers on what is being done, and what could be done, by the government and industry to convince malicious actors that their attacks will not succeed and that risk of repercussions exists. Traditional deterrence strategies of retaliation, denial and entanglement appear to lack the necessary conditions of capability, credibly, and communications due to these malicious actors’ advantages in cyberspace. In response, the book offers the option of adopting a strategy of active cyber defense that combines internal systemic resilience to halt cyber attack progress with external disruption capacities to thwart malicious actors’ objectives. It shows how active cyber defense is technically capable and legally viable as an alternative strategy for the deterrence of cyber attacks.Trade ReviewGiven the current news cycle, few books seem as relevant today as Jasper’s detailed and precise examination of the US cyber environment. Traditional methods of deterring an adversary (direct military action or the threat of direct action) are not viable in the age of cyber attacks, which can be carried out by both nations and individuals. How, then, do we deter attacks? What tools are at our disposal? What are legitimate retaliation methods? Jasper (Naval Postgraduate School) examines these questions in depth. He makes the case for the issue's relevance and urgency in the realm of international defense with numerous examples, such as the North Korean theft, via cyber warfare, of US wing designs for the US F-15 fighter. Other states have made similar attacks, compromising American defense, financial, and social systems. Jasper stresses that a national defense strategy to prevent, counter, and respond to cyber attacks requires automated and integrated capabilities employed outside traditional organizational boundaries. Without effective, coordinated strategies, international cyber attacks will continue to threaten federal agencies, commercial industry, and the fabric of our society. Appropriate for advanced students and professionals in the realm of defense and cyber technology policy. Summing Up: Recommended. Upper-division undergraduates through faculty and professionals * CHOICE *In the development of American cybersecurity policy, deterrence has simultaneously grown more important and more controversial, leaving policymakers who confront mounting cyber threats tempted by deterrent strategies shrouded in doubts about their effectiveness. In Strategic Cyber Deterrence, Scott Jasper breaks down the theory and practice of deterrence within the realm of cyberspace and argues that the traditional approaches of deterrence by retaliation, denial, and entanglement fail as strategic options. Instead, Jasper advocates for achieving strategic deterrence by combining robust, resilient cyber defenses with capabilities to engage in aggressive but calibrated countermeasures. His engaging contribution carefully cuts through the prevailing “something must be done” approaches to deterrence in cybersecurity and offers a strategy tailored to the challenges and capabilities that define the cyber realm. -- David P. Fidler, Adjunct Senior Fellow for Cybersecurity, Council on Foreign RelationsTable of ContentsI. Thinking About Deterrence 1. Strategic Landscape 2. Cyber Attacks 3. Theoretical Foundations II. Traditional Deterrence Options 4. Deterrence by Retaliation 5. Deterrence by Denial 6. Deterrence by Entanglement III. A Strategic Alternative 7. Active Cyber Defense 8. Alternative Strategy Selection Appendix: National Strategy Agenda

    Out of stock

    £36.90

  • Cases in U.S. National Security: Concepts and

    Rowman & Littlefield Cases in U.S. National Security: Concepts and

    1 in stock

    Book SynopsisModeled after his successful Cases in International Relations, now in its seventh edition, revered author and scholar, Don Snow, presents an engaging and novel approach to national security. A series of brief case studies representing current and controversial policy problems facilitates deliberation and debate about competing policy ideas, and encourages undergraduate students to think critically about issues of national security. Cases include new strategies for containing the terrorist threat, implications of President Trump’s withdrawal from the Iran Nuclear Agreement, and the increasingly adversarial relations with Russia, focusing on Russian expansionism in its geographical domain and interference in the 2016 American presidential election as national security problems for America.Trade Review“A one-stop-shop for thoughtful discussions on contemporary security topics that will help introductory and intermediate-level students understand and engage in the challenges of our times.” -- Tom Moriarty, American University“The best textbook designed specifically to provide students with an informed foundation for developing reasoned judgments about national security issues and debates.” -- Jordan Tama, American University“A useful collection of contemporary case studies to enrich student learning on national security issues.” -- Matthew Zierler, Michigan State UniversityTable of ContentsPreface Chapter 1 Starting at the Beginning: Basic Dynamics and Concerns Part I Strategic Dynamics Chapter 2 Asymmetrical Warfare: The New American Way of War? Chapter 3 The Evolving Face of Terror: The Dilemmas of Terrorism Strategy Chapter 4 Nuclear Deterrence Redux: The New Shadow of the Mushroom-Shaped Cloud Chapter 5 Dealing with Nuclear Proliferation: The NPT and BMD Approaches Chapter 6 Two Scorpions in a Bottle: Dealing with the DPRK Chapter 7 The Great Satans: The U.S., Iran, and Nuclear Weapons Part II Geographic Spotlights Chapter 8 The Continuing Middle East Riddle: Jerusalem and the Palestinian State Chapter 9 America’s Longest War: The Afghanistan Trap Chapter 10 Syria: The Perfect Maelstrom Chapter 11 Russia: Dealing with a Long-Time Rival Chapter 12 China: Dealing with the Frenemy with a New Face Chapter 13 Africa: The New Battleground? Part III Political Context Chapter 14 How Much of What Is Enough? Kinds and Levels of U.S. Force Chapter 15 Military Personnel: Where Do the Soldiers Come From? Chapter 16 Cyber Security: The Newest Frontier Chapter 17 Force Multiplication: Drone Warfare or Drone Terror Conclusion Chapter 18 Quo Vadis: Facing the National Security Future

    1 in stock

    £28.50

  • Historical Dictionary of Cold War Intelligence

    Rowman & Littlefield Historical Dictionary of Cold War Intelligence

    Out of stock

    Book SynopsisThe Cold War was a sophisticated conflict fought by the west, principally the United States, Great Britain, Canada, Australia and New Zealand, with support from NATO, CENTO and SEATO, to confront the Kremlin and its Warsaw Pact satellites. The battlegrounds extended from Latvia, Lithuania, Estonia, Byelorussia and Albania to Czechoslovakia, Poland and Hungary, and resulted in conventional, proxy wars fought in Vietnam, Egypt and Korea. Only now, thirty years after the fall of the Berlin Wall, can these issues be examined through the prism of the secret files generated by the intelligence agencies on both sides which have been declassified.This Historical Dictionary of Cold War Intelligence contains a chronology, an introduction, and an extensive bibliography. The dictionary section has hundreds of cross-referenced dictionary entries on crucial operations spies, defectors, moles, double and triple agents, and the tradecraft they apply. This book is an excellent resource for students, researchers, and anyone wanting to know more about intelligence during the Cold War.Table of ContentsEditor’s Foreword (Jon Woronoff)Acronyms and AbbreviationsChronologyIntroductionTHE DICTIONARYAppendix 1: Soviet Antisubmarine Warfare: Current Capabilities and Priorities.Appendix 2: CIA Country Plan for AlbaniaAppendix 3: The Berlin Tunnel,1967 AssessmentAppendix 4: MI5 Study of Soviet Defectors.1948Appendix 5: BfV Annual Report,1963Appendix 6: CIA Clandestine Service Primer on HUMINT,1961Appendix 7: CIA Report on the 1956 Hungarian Uprising Appendix 8: CIA Report on Lithuania, dated 1953Appendix 9: CIA Report on Penkovsky’s Legacy, 1971Appendix 10: NATO Threat Assessment,1973BibliographyAbout The Author

    Out of stock

    £138.60

  • The New Era in U.S. National Security: Challenges

    Rowman & Littlefield The New Era in U.S. National Security: Challenges

    Out of stock

    Book SynopsisThe first edition of The New Era in U.S. National Security relied upon both primary and secondary sources on national security, as well as the author’s first-hand knowledge. In addition to academic sources, chief executive officers of fortune 500 firms, experts on national security within and outside government, investment bankers, and experts in cybersecurity, transnational crime, supply chain logistics, and public policy were interviewed and quoted in the text. These same sources and their reassessments are available for the second edition. The topics covered in the book are emerging issues. Currently, the most reliable body of literature is the property of private entities and classified government documents, which are largely not available to students. By contrast, most course texts are readers that offer a selection of views on diverse but relevant topics, but most have a mere few chapters on new security challenges. Without an informative core text and reference guide, students have to rely upon these compendia, popular news articles, and electronic media for study and research. The second edition of The New Era offers students and instructors a whole cloth, insightful perspective on the dynamic, changing patterns and orientations unleashed by the processes of globalization, technology, and the emerging “Second Cold War” era.Table of ContentsPreface 1. The National Security Establishment The United State and the World Stage A Brief History of the Structure The New Reorganization Budgeting, and Planning in Support of Policy Striking a Balance between Domestic and Foreign Affairs Conclusion 2. Policies and Process and the New Geopolitics Evolution of Strategy An Era of New Weaponry and Geopolitics The Role of the Private Sector The Status and Future of DHS Conclusion 3. Irregular Warfare and Information Age Weapons Asymmetric Warfare A World of Weapons The Phenomenon of Social Media The Weaponization of Social Media Audience Mapping, Targeted Messaging, and “Kompromat” The Weaponization of Information Conclusion 4. Conflict and Economics Technology, the Information Age, and the Costs of War Global Economics and Migration The Rise of Kleptocracy Non-Asymmetric Warfare Conclusion 5. A Vast and Contested Domain Information Technology vs Operational Technology National Critical Infrastructure The Election Infrastructure Big Data Machine learning Artificial Intelligence & Autonomous Weapons Systems Conclusion 6. Cyberspace and Conflict What is Cyberspace? The Inception The Militarization The Malware Advanced Persistent Threat (APT) The Onion Router (TOR) The Deep and Dark Web Conclusion 7. China The Belt and Road Initiative A Cyber Cold War “Kill with a Borrowed Sword” The Great Firewall and the Great Cannon A Sprawling National Security Environment Conclusion 8. Russia Cold War 2.0 The Merger of Politics and Criminality Active Measures and Cyberwarriors Ukraine, 2014 United States, 2016 Tactical Nuclear Weapons Conclusion 9. The Maritime Supply Chain Vast, Diverse, and Anarchic Containerization Targeting, Screening, Scanning, and Inspecting Trusted Shippers and Layered Defenses Calculating the Dangers and the Risk An Opaque and Expanding Environment Choke Points Conclusion 10. Politics, Crime, and Terror Crime and Terrorism: Differences and Similarities Crime and Terrorism: The Nexus West Toward Chechnya and Russia The Tri-Border Area (TBA) Chinese Triads Conclusion 11. Chemical, Biological, Radiological & Nuclear Threats Chemical Warfare Resurgence in Chemical Weapons Chemical Agents Threats and Countermeasures Non-Terrorist Threats Biological Threats Biological Agents Synthetic Biology Biosecurity Policy Radiological and Nuclear Threats What is radioactivity? So, You Want to Build a Bomb? The Dirty Bomb Alternative Controlling proliferation Conclusion

    Out of stock

    £72.90

  • The New Era in U.S. National Security: Challenges

    Rowman & Littlefield The New Era in U.S. National Security: Challenges

    1 in stock

    Book SynopsisThe first edition of The New Era in U.S. National Security relied upon both primary and secondary sources on national security, as well as the author’s first-hand knowledge. In addition to academic sources, chief executive officers of fortune 500 firms, experts on national security within and outside government, investment bankers, and experts in cybersecurity, transnational crime, supply chain logistics, and public policy were interviewed and quoted in the text. These same sources and their reassessments are available for the second edition. The topics covered in the book are emerging issues. Currently, the most reliable body of literature is the property of private entities and classified government documents, which are largely not available to students. By contrast, most course texts are readers that offer a selection of views on diverse but relevant topics, but most have a mere few chapters on new security challenges. Without an informative core text and reference guide, students have to rely upon these compendia, popular news articles, and electronic media for study and research. The second edition of The New Era offers students and instructors a whole cloth, insightful perspective on the dynamic, changing patterns and orientations unleashed by the processes of globalization, technology, and the emerging “Second Cold War” era.Table of ContentsPreface 1. The National Security Establishment The United State and the World Stage A Brief History of the Structure The New Reorganization Budgeting, and Planning in Support of Policy Striking a Balance between Domestic and Foreign Affairs Conclusion 2. Policies and Process and the New Geopolitics Evolution of Strategy An Era of New Weaponry and Geopolitics The Role of the Private Sector The Status and Future of DHS Conclusion 3. Irregular Warfare and Information Age Weapons Asymmetric Warfare A World of Weapons The Phenomenon of Social Media The Weaponization of Social Media Audience Mapping, Targeted Messaging, and “Kompromat” The Weaponization of Information Conclusion 4. Conflict and Economics Technology, the Information Age, and the Costs of War Global Economics and Migration The Rise of Kleptocracy Non-Asymmetric Warfare Conclusion 5. A Vast and Contested Domain Information Technology vs Operational Technology National Critical Infrastructure The Election Infrastructure Big Data Machine learning Artificial Intelligence & Autonomous Weapons Systems Conclusion 6. Cyberspace and Conflict What is Cyberspace? The Inception The Militarization The Malware Advanced Persistent Threat (APT) The Onion Router (TOR) The Deep and Dark Web Conclusion 7. China The Belt and Road Initiative A Cyber Cold War “Kill with a Borrowed Sword” The Great Firewall and the Great Cannon A Sprawling National Security Environment Conclusion 8. Russia Cold War 2.0 The Merger of Politics and Criminality Active Measures and Cyberwarriors Ukraine, 2014 United States, 2016 Tactical Nuclear Weapons Conclusion 9. The Maritime Supply Chain Vast, Diverse, and Anarchic Containerization Targeting, Screening, Scanning, and Inspecting Trusted Shippers and Layered Defenses Calculating the Dangers and the Risk An Opaque and Expanding Environment Choke Points Conclusion 10. Politics, Crime, and Terror Crime and Terrorism: Differences and Similarities Crime and Terrorism: The Nexus West Toward Chechnya and Russia The Tri-Border Area (TBA) Chinese Triads Conclusion 11. Chemical, Biological, Radiological & Nuclear Threats Chemical Warfare Resurgence in Chemical Weapons Chemical Agents Threats and Countermeasures Non-Terrorist Threats Biological Threats Biological Agents Synthetic Biology Biosecurity Policy Radiological and Nuclear Threats What is radioactivity? So, You Want to Build a Bomb? The Dirty Bomb Alternative Controlling proliferation Conclusion

    1 in stock

    £38.95

  • The Art of Intelligence: More Simulations,

    Rowman & Littlefield The Art of Intelligence: More Simulations,

    Out of stock

    Book SynopsisThe only professional resource of its kind to offer in one volume original simulations, exercises, and games designed by academics and intelligence professionals from several countries. These interactive learning tools add immeasurable value to students’ understanding of the intelligence enterprise, and the various contributors provide an international perspective to the topics and approached. For use in undergraduate and graduate courses in intelligence, intel analysis, business intelligence, and various other national security policy courses offered in universities and government training facilities with the need for training in analytic principles and tradecraft.Table of ContentsChapter 1: Experiencing the Art of Intelligence: William J. Lahneman and Rubén Arcos Chapter 2: Open Source Intelligence Portfolio: Challenging and Developing Intelligence Production and Communication Skills through Simulations: Rubén Arcos Chapter 3: The Collaborative Discovery Process: Leveraging Community Resources to Combat Human Trafficking: Randolph H. Pherson and Karen Saunders Chapter 4: Practicing Foresight Analysis in Intelligence Courses: William J. Lahneman Chapter 5: Intelligence Sovereignty Game: Roger Mason Chapter 6: Intelligence, Security, and Democracy: Florina Cristiana Matei and Carolyn Halladay Chapter 7: Security Gaming Scenario: A Pun Upon . . . Cards in a Multicultural Setting: Irena Chiru and Cristina Ivan Chapter 8: Disseminating the Intelligence: A Briefing Exercise Using Discourse Analysis: Julian Richards Chapter 9: Speak of the Devil: Simulating Competitive analysis in the Classroom: Stephen Coulthart Chapter 10: Spymaster: An Introduction to Collection Management (A Simulation): Kristan Wheaton Chapter 11: The Mysterious Tradecraft of the Great Pulcinella – Distraction, Deception and Deterrence: Chris Jagger and Shaun Romeril Chapter 12: Strategic Visioning: Processes to Facilitate Decision Making Within Complex Social Systems: Sheila R. Ronis and Richard J. Chasdi Competitive Intelligence Chapter 13: Building an alert-based scenario analysis gaming program for your organization: Nanette J. Bulger Chapter 14: Competitive Simulations in support of a product launch in the biopharmaceutical industry: Alfred Reszka and Daniel Pascheles

    Out of stock

    £80.10

  • A Practical Introduction to Homeland Security:

    Rowman & Littlefield A Practical Introduction to Homeland Security:

    5 in stock

    Book SynopsisThe book gives a practical introduction to the concepts, structure, politics, law, hazards, threats, and practices of homeland security everywhere, focusing on US homeland security, Canadian public safety, and European domestic security. It is a conceptual and practical textbook, not a theoretical work.Table of ContentsDetailed Contents List of Figures, Tables, and Photos Preface & Acknowledgements About the Authors Chapter 1: Conceptualizing Homeland Security Chapter 2: Structuring Homeland Security Chapter 3: Laws of Homeland Security Chapter 4: Transnational Crime Chapter 5: Terrorism Chapter 6: Chemical, Biological, Nuclear, Radioactive, Explosive, and Energy (CBNREE) Hazards Chapter 7: Natural Risks Chapter 8: Intelligence Chapter 9: Emergency Management Chapter 10: Physical Site and Infrastructure Security Chapter 11: Information, Communications, and Cyber Security Chapter 12: Immigration and Border Security Chapter 13: Transport Security Glossary Notes Index

    5 in stock

    £69.35

  • How to Think about Homeland Security: The

    Rowman & Littlefield How to Think about Homeland Security: The

    Out of stock

    Book SynopsisVolume 1: The Imperfect Intersection of National Security and Public Safety explains homeland security as a struggle to meet new national security threats with traditional public safety practitioners. It offers a new solution that reaches beyond training and equipment to change practitioner culture through education. This first volume represents a major new contribution to the literature by recognizing that homeland security is not based on theories of nuclear response or countering terrorism, but on making bureaucracy work. The next evolution in improving homeland security is to analyze and evaluate various theories of bureaucratic change against the national-level catastrophic threats we are most likely to face. This synthesis provides the bridge between volume 1 (understanding homeland security) and the next in the series (understanding the risk and threats to domestic security). All four volumes could be used in an introductory course at the graduate or undergraduate level. Volumes 2 and 3 are most likely to be adopted in a risk management (RM) course which generally focus on threats, vulnerabilities, and consequences, while volume 4 will get picked up in courses on emergency management (EM).Trade Review“Though I am not the historian Dr. McIntyre is, I am well-versed in national strategy both academically and in actual execution. This book is the best distillation of the history, evolution, and practice of national strategy and its transition/application to homeland security that I have read…. It should be required reading for every official in DHS, and every new recruit or hire into the organization.” -- W. Michael Dunaway, University of Lousiana at Lafayette“This book provides great insights while remaining imminently readable. Having heard Dr. McIntyre speak on a number of occasions, I took pleasure in noting the preservation of his same conversational tone in his writing. A security practitioner for half of his adult life, what is occasionally described as ‘pracademic’ attitudes enrich his teaching, and in this case, his writing. The book ‘speaks’ to the reader, which--from another ‘pracademic’--is very deliberate praise.” -- Bert B. Tussing, U.S. Army War CollegeYou need to read this book now. Send it forward to policymakers, practitioners, and educators. This is a must-read for our profession. -- Steve Recca, Naval Postgraduate School“McIntyre’s How to Think About Homeland Security is an interesting and concise effort to embody the goal described in the title. The book is intended to help refine—and redefine—the manner in which academics and practitioners view the underpinnings of homeland security.” -- Tobias Gibson, Westminster College“Scholarly and compelling…A great resource for policy examination, review, and citations -- John G. Comiskey, Monmouth UniversityTable of ContentsPart I: The Concept of National Security 1. What is a Nation? 2. What is Security? 3. What is National Security? 4. National Security Begins with Academics, Inquiry and Theory 5. Conflicting Ways to Think About Security 6. Conflicting Beliefs about Security (the Nature of Man) Part II: The Emergence of National Security Strategy 7. From Thought and Belief to Security Theory and Practice 8. What is Strategy? 9. What is a National Security Strategy? 10. What is THE US National Security Strategy? Part III: The Emergence of Homeland Security 11. What is Homeland Security and Why Does It Exist? 12. Building a Systemic Solution for a New Domestic Defense 13. Systemic Challenge #1: Tensions 14. Systemic Challenge #2: Perspectives 15. Systemic Challenge #3: Theories (or lack thereof) Part IV: Imperfect Intersection 16. How to Think About Homeland Security: Go Ask Your MOMs

    Out of stock

    £45.60

  • How to Think about Homeland Security: The

    Rowman & Littlefield How to Think about Homeland Security: The

    Out of stock

    Book SynopsisVolume 1: The Imperfect Intersection of National Security and Public Safety explains homeland security as a struggle to meet new national security threats with traditional public safety practitioners. It offers a new solution that reaches beyond training and equipment to change practitioner culture through education. This first volume represents a major new contribution to the literature by recognizing that homeland security is not based on theories of nuclear response or countering terrorism, but on making bureaucracy work. The next evolution in improving homeland security is to analyze and evaluate various theories of bureaucratic change against the national-level catastrophic threats we are most likely to face. This synthesis provides the bridge between volume 1 (understanding homeland security) and the next in the series (understanding the risk and threats to domestic security). All four volumes could be used in an introductory course at the graduate or undergraduate level. Volumes 2 and 3 are most likely to be adopted in a risk management (RM) course which generally focus on threats, vulnerabilities, and consequences, while volume 4 will get picked up in courses on emergency management (EM).

    Out of stock

    £23.75

  • How to Think about Homeland Security: Risk,

    Rowman & Littlefield How to Think about Homeland Security: Risk,

    Out of stock

    Book SynopsisRisk, Threats and the New Normal explains the new political and technological developments that created new domestic national security threats against the nation and the people of the United States.The book traces the development of and competition between national preparedness (focused on people and property), and civil defense / security (focused on the defense of systems and infrastructure) since the latter days of World War I. While Homeland Security was created to meet national security threats in the domestic arena, most of the duties have devolved to public safety personnel and organizations. The result is a clash of cultures, jurisdictions, and perspectives that produces “less than optimal” results from the many bureaucracies involved. The second of four volumes in McIntyre’s How to Think About Homeland Security series offers suggestions for how these issues might be addressed by Homeland Security.Table of ContentsList of Figures, Tables, and Textboxes Foreword by General Ralph Eberhart Acknowledgments About This Series Introducing the Concept of Frameworks: Thinking About Thinking About Homeland Security Part I: Thinking About Risk 1.Threat, Preparedness and Defense: A History of Adapting to a New Normal 2.From Countering Terrorism to a Preparedness System: Rethinking Homeland Security 3.The DHS Risk Management Process 4.Improving the Utility, and Reducing the Risk, of Risk 5.Following the Clues: The Shifting Focus of Risk Management 6.A Brother by Another Mother: Risk Management for Critical Infrastructure Part II: Thinking About Threats 7.Not All MOMs Are Created Equal: The TNSL Test 8.The Special Danger of Terrorism at the National Security Level 9.The Nature, Character and Conduct of War 10.The Dangerous Enigma of Terrorism 11. Terrorism as Criminal War Part III: Thinking About the New Normal 12.A Framework for Thinking About Threats and the New Normal 13.Shall we Play a Game? (Preparedness and a Nuclear MOM) 14.From Preparedness to National Defense (Nuclear TNSL MOM) 15.TNSL MOMs, Bad DADs, and a Newer New Normal Index About the Author

    Out of stock

    £40.50

  • How to Think about Homeland Security: Risk,

    Rowman & Littlefield How to Think about Homeland Security: Risk,

    Out of stock

    Book SynopsisRisk, Threats and the New Normal explains the new political and technological developments that created new domestic national security threats against the nation and the people of the United States.The book traces the development of and competition between national preparedness (focused on people and property), and civil defense / security (focused on the defense of systems and infrastructure) since the latter days of World War I. While Homeland Security was created to meet national security threats in the domestic arena, most of the duties have devolved to public safety personnel and organizations. The result is a clash of cultures, jurisdictions, and perspectives that produces “less than optimal” results from the many bureaucracies involved. The second of four volumes in McIntyre’s How to Think About Homeland Security series offers suggestions for how these issues might be addressed by Homeland Security.Table of ContentsList of Figures, Tables, and Textboxes Foreword by General Ralph Eberhart Acknowledgments About This Series Introducing the Concept of Frameworks: Thinking About Thinking About Homeland Security Part I: Thinking About Risk 1.Threat, Preparedness and Defense: A History of Adapting to a New Normal 2.From Countering Terrorism to a Preparedness System: Rethinking Homeland Security 3.The DHS Risk Management Process 4.Improving the Utility, and Reducing the Risk, of Risk 5.Following the Clues: The Shifting Focus of Risk Management 6.A Brother by Another Mother: Risk Management for Critical Infrastructure Part II: Thinking About Threats 7.Not All MOMs Are Created Equal: The TNSL Test 8.The Special Danger of Terrorism at the National Security Level 9.The Nature, Character and Conduct of War 10.The Dangerous Enigma of Terrorism 11. Terrorism as Criminal War Part III: Thinking About the New Normal 12.A Framework for Thinking About Threats and the New Normal 13.Shall we Play a Game? (Preparedness and a Nuclear MOM) 14.From Preparedness to National Defense (Nuclear TNSL MOM) 15.TNSL MOMs, Bad DADs, and a Newer New Normal Index About the Author

    Out of stock

    £23.75

  • Methods of Inquiry for Intelligence Analysis

    Rowman & Littlefield Methods of Inquiry for Intelligence Analysis

    10 in stock

    Book SynopsisFew professions have experienced change to the same extent as has intelligence. Since the 9/11 attacks, the role of intelligence has continued to grow, and its mission remains complex. Government and private security agencies are recruiting intelligence analysts in ever higher numbers to process what has become a voluminous amount of raw information and data. Methods of Inquiry for Intelligence Analysis offers students the means of gaining the analytic skills essential to undertake intelligence work, and the understanding of how intelligence fits into the larger research framework. It covers not only the essentials of applied research, but also the function, structure, and operational methods specifically involved in intelligence work.Trade ReviewA text for academics, students, and practitioners who are interested in understanding the changes taking affect in the area of intelligence and in the role of analysts. -- Garth den Heyer, Arizona State UniversityMethods of Inquiry for Intelligence Analysis presents a strong discussion of the subject from a perspective grounded in the scientific method, while providing a comprehensive and well-organized overview of how various intelligence products are developed and disseminated. -- Mark Feulner, Florida State UniversityHaving examples of the types of analysis makes the book extremely strong and useful in the classroom; students need to see concrete examples of theories in practice. -- Ken Stiles, Virginia TechTable of ContentsChapter 1 Intelligence Theory Chapter 2 Intelligence Organizational Structures Chapter 3 The Intelligence Research Process Chapter 4 Clandestine and Covert Sources of Information Chapter 5 Open Sources of Information Chapter 6 Qualitative Analytics Chapter 7 Quantitative Analytics Chapter 8 Geointelligence Chapter 9 Target Profiles Chapter 10 Operational Assessments Chapter 11 Vehicle Route Security Report Chapter 12 Threat Assessments Chapter 13 Vulnerability Assessments Chapter 14 Risk Assessments Chapter 15 National Security Policy Assessments Chapter 16 Appendix—Critical Values of Chi-Square Distribution Chapter 17 About the Author Chapter 18 Index

    10 in stock

    £102.18

  • Historical Dictionary of Chinese Intelligence

    Rowman & Littlefield Historical Dictionary of Chinese Intelligence

    Out of stock

    Book SynopsisThe second edition of Historical Dictionary of Chinese Intelligence covers the history of Chinese Intelligence from 400 B.C. to modern times. The dictionary section has over 400 cross-referenced entries on the agencies and agents, the operations and equipment, the tradecraft and jargon, and many of the countries involved.

    Out of stock

    £91.80

  • Whistleblowers, Leakers, and Their Networks: From

    Rowman & Littlefield Whistleblowers, Leakers, and Their Networks: From

    Out of stock

    Book SynopsisWith its conceptual innovations and case studies, Whistleblowers clarifies the much-discussed but under-studied phenomena of leaking and whistleblowing, with a particular focus on the collaborative networks that make the extraction and publication of secrets possible.Table of ContentsCh. 1: Introduction Ch. 2: Conceptualizing Whistleblowing Ch. 3: Who Blows Whistles? Insiders, Outsiders, and Their Networks Ch. 4: Dark Networks that Shed Light: The Case of the Chronicle of Current Events Ch. 5: The Curious Grapevine in Reverse: Human Rights Organizations’ Whistleblowing Networks Ch. 6: WikiLeaks's Rise, Relevance, and Power Ch. 7: The Wide World of Whistleblowing on the Web Ch. 8: Exfiltrators Ch. 9: Conclusion

    Out of stock

    £56.70

  • Whistleblowers, Leakers, and Their Networks: From

    Rowman & Littlefield Whistleblowers, Leakers, and Their Networks: From

    Out of stock

    Book SynopsisWith its conceptual innovations and case studies, Whistleblowers clarifies the much-discussed but under-studied phenomena of leaking and whistleblowing, with a particular focus on the collaborative networks that make the extraction and publication of secrets possible.Table of ContentsCh. 1: Introduction Ch. 2: Conceptualizing Whistleblowing Ch. 3: Who Blows Whistles? Insiders, Outsiders, and Their Networks Ch. 4: Dark Networks that Shed Light: The Case of the Chronicle of Current Events Ch. 5: The Curious Grapevine in Reverse: Human Rights Organizations’ Whistleblowing Networks Ch. 6: WikiLeaks's Rise, Relevance, and Power Ch. 7: The Wide World of Whistleblowing on the Web Ch. 8: Exfiltrators Ch. 9: Conclusion

    Out of stock

    £31.50

  • Cyber in the Age of Trump: The Unraveling of

    Rowman & Littlefield Cyber in the Age of Trump: The Unraveling of

    Out of stock

    Book SynopsisDid the Trump administration have a cybersecurity strategy, or was it hell-bent on dismantling years of consensus-building on how the nation should respond to an existential threat to its digital life blood? Based on insider accounts and exclusive interviews with experts, Cyber in the Age of Trump offers a first-time chronicle and analysis of the Trump administration's approach to cybersecurity, its curious decisions and strategic choices, places where its work has earned applause, and the places where cyber pros see major signs of danger. The new administration came in with a strong faith in technology, a sense that the U.S. could better deploy its cyber weaponry to deter foes, and a willingness to continue popular Obama-era policies on collaborating with industry. But it didn't seem to have a cyber vision, or one that was applied consistently. And in the absence of such a strategic overview, the threat to the nation would only grow. Cyber in the Age of Trump is the first book to examine the impact of President Trump on the nation’s greatest long-term strategic challenge and how a “disruptor presidency” has upended consensus and threatened to derail cyber policy.

    Out of stock

    £28.50

  • Spies on Trial: True Tales of Espionage in the

    Rowman & Littlefield Spies on Trial: True Tales of Espionage in the

    Out of stock

    Book SynopsisThe spy business often results in a sudden exchange of the dark shadows of the clandestine back room for the bright lights of the open courtroom. The situations that judges and juries face in espionage cases are typically more unusual, complex, and diverse than one might possibly imagine. Cecil C. Kuhne III describes a number of historical, law changing judicial cases, well-publicized criminal trials of those accused of treason against the United States, as well as lawsuits concerning other unusual matters, such as the governmental restrictions on bugging and other surveillance devices that cannot be sold to the general public. The author successfully explores well known espionage cases, such as the Julius and Ethel Rosenberg and Morton Sobell trial of 1951, as well as more recent cases where the courts have dealt with the activities of the National Security Administration (NSA) as they monitor telephone communications in their efforts to apprehend terrorist organizations. Spies on Trial brings the reader fast-paced stories of foreign spies engaged in daring deeds of sleuthing that undoubtedly have more than their fair share of intriguing moments. But nowhere is this suspense more intense than inside the courtroom, where the drama of intense covert activities is fully unfurled, offering fascinating glimpses into this vast and nefarious underground world of international espionage.Trade ReviewMr. Kuhne's focus on the applicable laws used to promote the acts of Espionage discussed in his book is a unique approach. He tells the interesting story of where spying and jurisprudence have met in the courtroom. Both fans of nonfiction espionage literature and of timely legal issues should find it an interesting read. -- Gene Coyle, Retired 30-year Veteran of the CIA and Recipient of the CIA's Intelligence Medal of MeritThe practice of intelligence in democratic societies is by definition inextricably linked with the system of law. This is something that students —alas, even practitioners— of intelligence often forget. Kuhne skillfully reminds us in this book, by revisiting some of the most decisive intelligence- and espionage-related legal cases in American history. The cases he discusses are neither pedantic nor obscure —they have made history in both the world of law and the world of intelligence. This book is invaluable for those who wish to truly comprehend the connections between them. -- Joseph Fitsanakis, Associate Professor of Politics, Intelligence and National Security Studies program, Coastal Carolina University

    Out of stock

    £28.50

  • The Opium Queen: The Untold Story of the Rebel

    Rowman & Littlefield The Opium Queen: The Untold Story of the Rebel

    10 in stock

    Book Synopsis

    10 in stock

    £18.99

  • Manipulated: Inside the Cyberwar to Hijack

    Rowman & Littlefield Manipulated: Inside the Cyberwar to Hijack

    Out of stock

    Book SynopsisCybersecurity expert Theresa Payton tells battlefront stories from the global war being conducted through clicks, swipes, internet access, technical backdoors and massive espionage schemes. She investigates the cyberwarriors who are planning tomorrow’s attacks, weaving a fascinating yet bone-chilling tale of Artificial Intelligent mutations carrying out attacks without human intervention, “deepfake” videos that look real to the naked eye, and chatbots that beget other chatbots. Finally, Payton offers readers telltale signs that their most fundamental beliefs are being meddled with and actions they can take or demand that corporations and elected officials must take before it is too late.

    Out of stock

    £16.99

  • The Academic-Practitioner Divide in Intelligence

    Rowman & Littlefield The Academic-Practitioner Divide in Intelligence

    Out of stock

    Book SynopsisInternationally, the profession of intelligence continues to develop and expand. So too does the academic field of intelligence, both in terms of intelligence as a focus for academic research and in terms of the delivery of university courses in intelligence and related areas. To a significant extent both the profession of intelligence and those delivering intelligence education share a common aim of developing intelligence as a discipline. However, this shared interest must also navigate the existence of an academic-practitioner divide. Such a divide is far from unique to intelligence – it exists in various forms across most professions – but it is distinctive in the field of intelligence because of the centrality of secrecy to the profession of intelligence and the way in which this constitutes a barrier to understanding and openly teaching about aspects of intelligence. How can co-operation in developing the profession and academic study be maximized when faced with this divide? How can and should this divide be navigated? The Academic-Practitioner Divide in Intelligence provides a range of international approaches to, and perspectives on, these crucial questions.Table of ContentsAcknowledgementsChapter 1: Navigating the Academic-Practitioner Divide in Intelligence Studies – Rubén Arcos, Nicole K. Drumhiller, Mark PhythianChapter 2: Being on the Outside Looking In: Reflections of a Former Practitioner Turned Academic - David Omand Chapter 3: Neither Knuckle-draggers nor Carpetbaggers: Proposing the Periclean Ideal for Intelligence Educators - Nicholas DujmovićChapter 4: Intelligence, Science and the Ignorance Hypothesis – David R. Mandel Chapter 5: Intelligence and the US Army War College: The Academic-Practitioner Relationship in Professional Military Education – Genevieve Lester, James G. Breckenridge, and Thomas Spahr Chapter 6: Assessing the Quality of Strategic Intelligence Products: Cooperation and Competition between Scholars and Practitioners - José-Miguel Palacios Chapter 7: Lessons Learned for the Private Sector Intelligence Analyst – Michael J. ArdChapter 8: Understanding and Countering Hybrid Threats Through a Comprehensive and Multinational Approach: The Role of Intelligence – Rasmus Hindren and Hanna Smith Chapter 9: Building Ecosystems of Intelligence Education: "The Good, the Bad, and the Ugly" - Irena Chiru and Adrian-Liviu Ivan Chapter 10: The Academic-Practitioner Relationship in France: From Strangers to Partners - Damien Van Puyvelde Chapter 11: Playing to Our Strengths: Combining Academic Rigour and Practitioner Experience in Delivering Intelligence Education in Australia - Troy Whitford and Charles Vandepeer Chapter 12: The Academic/Practitioner Divide in Intelligence: A Latin American Perspective - Andrés de Castro García and Carolina Sancho Hirane Chapter 13: Teaching Ethical Intelligence in a World that Doesn't Think It Needs It – Jan Goldman Chapter 14: Bridging the Divide – Rubén Arcos, Nicole K. Drumhiller, Mark PhythianList of Tables and FiguresBibliographyAbout the Authors

    Out of stock

    £90.00

  • Shadow Warfare: Cyberwar Policy in the United

    Rowman & Littlefield Shadow Warfare: Cyberwar Policy in the United

    Out of stock

    Book SynopsisCyberwarfare, like the seismic shift of policy with nuclear warfare, is modifying warfare into non-war warfare. A few distinctive characteristics of cyberwar emerge. Cyberwarfare has blurred the distinction between adversary and ally. Cyber probes continuously occur between allies and enemies alike, causing cyberespionage to merge with warfare. Espionage, as old as war itself, has technologically merged with acts of cyberwar as states threaten each other with prepositioned malware in each other’s cyberespionage probed infrastructure. These two cyber shifts to warfare are agreed upon and followed by the US, Russia and China. What is not agreed upon in this shifting era of warfare are the policies upon which cyberwarfare is based. This book charts the policies in three key actors and navigates the futures of policy on an international stage. Table of ContentsChapter 1. Non-War WarfareChapter 2. Cyber United StatesChapter 3. Cyber RussiaChapter 4. Cyber ChinaChapter 5. Cyberwar PolicyBibliography

    Out of stock

    £80.10

  • Shadow Warfare: Cyberwar Policy in the United

    Rowman & Littlefield Shadow Warfare: Cyberwar Policy in the United

    Out of stock

    Book SynopsisCyberwarfare, like the seismic shift of policy with nuclear warfare, is modifying warfare into non-war warfare. A few distinctive characteristics of cyberwar emerge. Cyberwarfare has blurred the distinction between adversary and ally. Cyber probes continuously occur between allies and enemies alike, causing cyberespionage to merge with warfare. Espionage, as old as war itself, has technologically merged with acts of cyberwar as states threaten each other with prepositioned malware in each other’s cyberespionage probed infrastructure. These two cyber shifts to warfare are agreed upon and followed by the US, Russia and China. What is not agreed upon in this shifting era of warfare are the policies upon which cyberwarfare is based. This book charts the policies in three key actors and navigates the futures of policy on an international stage. Table of ContentsChapter 1. Non-War WarfareChapter 2. Cyber United StatesChapter 3. Cyber RussiaChapter 4. Cyber ChinaChapter 5. Cyberwar PolicyBibliography

    Out of stock

    £31.50

© 2025 Book Curl

    • American Express
    • Apple Pay
    • Diners Club
    • Discover
    • Google Pay
    • Maestro
    • Mastercard
    • PayPal
    • Shop Pay
    • Union Pay
    • Visa

    Login

    Forgot your password?

    Don't have an account yet?
    Create account